Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
5c07b160cfd239fce80b483c5f9aa787.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c07b160cfd239fce80b483c5f9aa787.exe
Resource
win10v2004-20231222-en
General
-
Target
5c07b160cfd239fce80b483c5f9aa787.exe
-
Size
77KB
-
MD5
5c07b160cfd239fce80b483c5f9aa787
-
SHA1
7902ebf2588d014d2c448351c090244a135b9407
-
SHA256
c8b2ce588f1708d8561f2e0e266ca09608d4bdd57500d87960ee4af2bae93717
-
SHA512
1251b53e5bab1cc31c39dd6866d67d088aee21a06acdcbae18ea9bda653d8327679cec47cb01539741683b5f309c1932df499fa29a0a60d6aa8e3d5b06a1a826
-
SSDEEP
1536:sNMUtKwEMtLqWHrVGxmx7sQ9PCdd6BVF9BI3iWhd9QrOa5OXi+c:J9MsWHZGxm/9PCz6BTXbg+1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 hinvserv.exe -
Executes dropped EXE 3 IoCs
pid Process 1972 hinvserv.exe 2636 bcdlmem.exe 2676 hinvserv.exe -
Loads dropped DLL 4 IoCs
pid Process 1472 5c07b160cfd239fce80b483c5f9aa787.exe 1472 5c07b160cfd239fce80b483c5f9aa787.exe 2636 bcdlmem.exe 2636 bcdlmem.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\acdllib3 = "C:\\Windows\\system32\\bcdlmem.exe" 5c07b160cfd239fce80b483c5f9aa787.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\acdllib3 = "C:\\Windows\\system32\\bcdlmem.exe" bcdlmem.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hinvserv.exe 5c07b160cfd239fce80b483c5f9aa787.exe File created C:\Windows\SysWOW64\hinvserv.exe 5c07b160cfd239fce80b483c5f9aa787.exe File opened for modification C:\Windows\SysWOW64\bcdlmem.exe hinvserv.exe File opened for modification C:\Windows\SysWOW64\hinvserv.exe bcdlmem.exe File opened for modification C:\Windows\SysWOW64\bcdlmem.exe hinvserv.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1972 hinvserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1972 1472 5c07b160cfd239fce80b483c5f9aa787.exe 16 PID 1472 wrote to memory of 1972 1472 5c07b160cfd239fce80b483c5f9aa787.exe 16 PID 1472 wrote to memory of 1972 1472 5c07b160cfd239fce80b483c5f9aa787.exe 16 PID 1472 wrote to memory of 1972 1472 5c07b160cfd239fce80b483c5f9aa787.exe 16 PID 1972 wrote to memory of 2636 1972 hinvserv.exe 29 PID 1972 wrote to memory of 2636 1972 hinvserv.exe 29 PID 1972 wrote to memory of 2636 1972 hinvserv.exe 29 PID 1972 wrote to memory of 2636 1972 hinvserv.exe 29 PID 2636 wrote to memory of 2676 2636 bcdlmem.exe 30 PID 2636 wrote to memory of 2676 2636 bcdlmem.exe 30 PID 2636 wrote to memory of 2676 2636 bcdlmem.exe 30 PID 2636 wrote to memory of 2676 2636 bcdlmem.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c07b160cfd239fce80b483c5f9aa787.exe"C:\Users\Admin\AppData\Local\Temp\5c07b160cfd239fce80b483c5f9aa787.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\hinvserv.exeC:\Users\Admin\AppData\Local\Temp\5c07b160cfd239fce80b483c5f9aa787.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\bcdlmem.exeC:\Windows\system32\bcdlmem.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\hinvserv.exeC:\Windows\SysWOW64\bcdlmem.exe4⤵
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
PID:2676
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD55c07b160cfd239fce80b483c5f9aa787
SHA17902ebf2588d014d2c448351c090244a135b9407
SHA256c8b2ce588f1708d8561f2e0e266ca09608d4bdd57500d87960ee4af2bae93717
SHA5121251b53e5bab1cc31c39dd6866d67d088aee21a06acdcbae18ea9bda653d8327679cec47cb01539741683b5f309c1932df499fa29a0a60d6aa8e3d5b06a1a826
-
Filesize
2KB
MD5a1ed06964c3063a4f92cd97a4adbd040
SHA102adb961b0ed39312ad84481e1c781ca0d731ef0
SHA256bc574c38e63b4b82a444ff7184b6cf6a5a9b635b484784436d42dba5a7cea19d
SHA512a1ea06d08d3dc6afc3056c8174bf8204c7f71135a6b8c3ac55ceef7348ab3886e16c6955ce569d12145ad9632274e8198252b6fc0509952c6c2d43086fc33fef